1 | January 14 | Intro | Detailed Reconstruction of an Internet-Scale Event | |
2 | January 21 | Measurement techniques, methodology, and ethics | Debian SSL Vulnerability ZMap: Fast Internet-Wide Scanning Botnet-based Internet Census 2012* | research prompt |
3 | January 28 | Browser fingerprinting | Panopticlick History sniffing Tracking survey FPDetective | |
4 | February 4 | Botnet infiltration and community ethical standards | Botlab Spamalytics Your Botnet is My Botnet ethical behavior in security research The Menlo Report | |
5 | February 11 | Deanonymization | Predicting Social Security Numbers from Public Data Robust De-anonymization of Large Sparse Datasets k-Anonymity: A Model for Protecting Privacy | midterm, due before class Feb 25 |
6 | February 18 | Online advertising | Privad Microtargeting privacy violations Who Do Online Advertisers Think You Are? | |
7 | February 25 | Special session: online advertising | No readings | |
8 | March 4 | Censorship | Freenet Tor Cirripede | |
9 | March 11 | Online Social Networks | Persona User Interactions in Social Networks Socialbots | |
10 | March 18 | Signal Reconstruction | (sp)iPhone TEMPEST Phonotactic Reconstruction | |
| March 25 | Spring Break - no class | No readings | |
11 | April 1 | k-Anonymity+ | l-Diversity
| please review the original k-Anonymity paper from week 5. |
12 | April 3 | More privacy preserving data analysis techniques | m-Invariance Differential Privacy | |
13 | April 15 | Bitcoin | Bitcoin Bitter to Better Payment Characterization | |
14 | April 17 | NSA scandal | Readings posted on Piazza | |
15 | April 30 | | | |